Threat Actor Characterization
Sowbug
ID: 84eae28f1b39b0c6b2d02da94c7f385624811Actor Network Graph
Open Network GraphMITRE ATT&CK®
Sowbug (G0054) is a document-focused cyber-espionage cluster active since at least 2015 that used the Felismus backdoor and the Starloader loader to quietly collect diplomatic files—primarily from South American and Southeast Asian government networks.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1560.001 | Archive via Utility | TA0009 |
|
| T1039 | Data from Network Shared Drive | TA0009 |
|
| T1135 | Network Share Discovery | TA0007 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1003 | OS Credential Dumping | TA0006 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1132.001 | Standard Encoding | TA0011 |
|
| T1573.001 | Symmetric Cryptography | TA0011 |
|
CLASSIFICATION: Unclassified / Open Source
Category: Cybercrime / Nation-State Espionage (suspected) – Origin: Unknown (activity centered on South America & Southeast Asia)
Executive Summary
Sowbug is a long-running cyber-espionage cluster active since at least 2015, with a consistent focus on foreign affairs and diplomatic entities in South America and Southeast Asia. Public reporting links the group to the modular backdoor Felismus and the Starloader dropper, enabling stealthy collection, credential theft, and long-term persistence. Operations documented by Symantec show multi-month footholds, use of living-off-the-land commands, and quiet after-hours activity to reduce detection. MITRE ATT&CK catalogs Sowbug’s tradecraft, including credential dumping, network share discovery, file discovery, keylogging, and archiving of collected data prior to exfiltration. Confirmed victim geography includes Argentina, Brazil, Ecuador, Peru, Brunei, and Malaysia, with targeting centered on foreign policy divisions. Overall analytic confidence in the historic behaviors and targeting is medium, based on convergent vendor reporting and MITRE entries.
- Industries/Sectors: Ministries of Foreign Affairs; diplomatic missions; government entities handling foreign policy.
- Geography (Region): South America; Southeast Asia. Countries observed: Argentina, Brazil, Ecuador, Peru, Brunei, Malaysia.
- Timeframe: Documented operations from 2015-05-06 onward; multi-month intrusions into 2016-09 → 2017-03; group visible in open sources since 2017-11-07.
Executive Analyst Brief for CISO
What it is: A document-harvesting espionage cluster using Felismus/Starloader to live quietly in Windows ministries and diplomatic networks (2015→). Targets: foreign-policy divisions, file servers, and office documents in LATAM/SEA.